Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
Users/cldieckmann/AppData/Roaming/windirect/ьяшмBCCC.exe
Resource
win7-20240903-en
General
-
Target
Users/cldieckmann/AppData/Roaming/windirect/ьяшмBCCC.exe
-
Size
507KB
-
MD5
2e3926b7123e1ec3cd57d7ffd7072bd3
-
SHA1
9077c965165d91d62023cbfb238bfe42a9720b6c
-
SHA256
f1f026eb520ff82fdae1b939b7f440d94dad05935717360763f924b239448c06
-
SHA512
be5fc9b5b4fa50a3fb2a5efd343c240478547e32c7dfe6389a6b39ee7a8fb8ae7053197c6c5c53b36154280938bf9f9a358c0e0d2fb1ec042223a58d2578de27
-
SSDEEP
12288:ylLeNBmly/c9JfUAeIcLE7G2D2FoMlZg/V:SLeNBmly/UUdU7qPg/V
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2668-0-0x0000000001DB0000-0x0000000001DE4000-memory.dmp trickbot_loader32 behavioral1/memory/2668-1-0x0000000000500000-0x0000000000531000-memory.dmp trickbot_loader32 behavioral1/memory/2496-19-0x0000000000510000-0x0000000000541000-memory.dmp trickbot_loader32 behavioral1/memory/2496-14-0x0000000000480000-0x00000000004B4000-memory.dmp trickbot_loader32 behavioral1/memory/2496-21-0x0000000000510000-0x0000000000541000-memory.dmp trickbot_loader32 behavioral1/memory/2496-20-0x0000000000280000-0x00000000002B0000-memory.dmp trickbot_loader32 behavioral1/memory/2496-25-0x0000000000510000-0x0000000000541000-memory.dmp trickbot_loader32 -
Dave packer 3 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral1/memory/2668-0-0x0000000001DB0000-0x0000000001DE4000-memory.dmp dave behavioral1/memory/2668-1-0x0000000000500000-0x0000000000531000-memory.dmp dave behavioral1/memory/2496-14-0x0000000000480000-0x00000000004B4000-memory.dmp dave -
Executes dropped EXE 2 IoCs
pid Process 2496 ьяшмDCCC.exe 284 ьяшмBCCC.exe -
Loads dropped DLL 2 IoCs
pid Process 2668 ьяшмBCCC.exe 2668 ьяшмBCCC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмBCCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмDCCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмBCCC.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2668 ьяшмBCCC.exe 2496 ьяшмDCCC.exe 284 ьяшмBCCC.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2496 2668 ьяшмBCCC.exe 31 PID 2668 wrote to memory of 2496 2668 ьяшмBCCC.exe 31 PID 2668 wrote to memory of 2496 2668 ьяшмBCCC.exe 31 PID 2668 wrote to memory of 2496 2668 ьяшмBCCC.exe 31 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2496 wrote to memory of 2744 2496 ьяшмDCCC.exe 32 PID 2956 wrote to memory of 284 2956 taskeng.exe 34 PID 2956 wrote to memory of 284 2956 taskeng.exe 34 PID 2956 wrote to memory of 284 2956 taskeng.exe 34 PID 2956 wrote to memory of 284 2956 taskeng.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Users\cldieckmann\AppData\Roaming\windirect\ьяшмBCCC.exe"C:\Users\Admin\AppData\Local\Temp\Users\cldieckmann\AppData\Roaming\windirect\ьяшмBCCC.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\ProgramData\ьяшмDCCC.exe"C:\ProgramData\ьяшмDCCC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2744
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {52FB2A99-3AFF-41EA-9840-894842563EBD} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\windirect\ьяшмBCCC.exeC:\Users\Admin\AppData\Roaming\windirect\ьяшмBCCC.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD52e3926b7123e1ec3cd57d7ffd7072bd3
SHA19077c965165d91d62023cbfb238bfe42a9720b6c
SHA256f1f026eb520ff82fdae1b939b7f440d94dad05935717360763f924b239448c06
SHA512be5fc9b5b4fa50a3fb2a5efd343c240478547e32c7dfe6389a6b39ee7a8fb8ae7053197c6c5c53b36154280938bf9f9a358c0e0d2fb1ec042223a58d2578de27